Happy Data Privacy Day!

WHAT ARE YOU DOING TO OBSERVE IT? Today is Data Privacy Day! If you have been wondering “what is Data Privacy Day?” then this is your lucky day because not only is today Data Privacy Day, but here is the answer and an explanation for why it really matters to you and your company’s future … Continue reading Happy Data Privacy Day!

Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?

Hear Shawn Tuma interviewed on News Radio 570 KLIF - Experts: Update Settings and Download Updates to Protect from “Meltdown” and “Spectre” CLICK HERE if you are impatient and only want to know what you should do ASAP to protect against Spectre and Meltdown With Y2K we had a warning. So much of a warning that … Continue reading Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?

The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years!

In the last quarter of 2017, I have observed a cybersecurity trend that has given me more hope than any that I have seen previously. Let me explain. As an attorney, I have been practicing what can generally be described as cyber law or cybersecurity law since 1999, which means that my practice has evolved a lot … Continue reading The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years!

Tips for Staying #CyberSecure While Shopping Online for #CyberMonday

Cybercriminals need shopping money for the Holidays and one of their favorite times to get yours is when you are shopping on #CyberMonday. https://youtu.be/ZPIEiQVQZ2I?t=31s Use these tips to help stay #cybersecure while shopping online for #CyberMonday and at any other time: Credit or debit? Use credit cards, not debit cards, for your online shopping. Debit cards … Continue reading Tips for Staying #CyberSecure While Shopping Online for #CyberMonday

Lost Unencrypted USB of Heathrow Airport Security Files Exemplifies Poor Cyber Hygiene

Basic cyber hygiene has been a hot topic in cybersecurity, and for good reason. Most of the incidents that impact companies start with failures of basic cyber hygiene, not the super-sophisticated stuff of the movies. See Start with Cybersecurity Basics: Confirmed by Verizon's 2016 Data Breach Report. One of the most fundamental rules of cyber hygiene is … Continue reading Lost Unencrypted USB of Heathrow Airport Security Files Exemplifies Poor Cyber Hygiene